blob: 767914bdd9e71c841ae340ccedced20ef81e5ed5 [file] [log] [blame]
/*
* Copyright (c) 2020-2022, Arm Limited. All rights reserved.
* Copyright (c) 2021-2022 Cypress Semiconductor Corporation (an Infineon
* company) or an affiliate of Cypress Semiconductor Corporation. All rights
* reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*
*/
#ifndef __SPM_IPC_H__
#define __SPM_IPC_H__
#include <stdint.h>
#include "config_impl.h"
#include "config_spm.h"
#include "current.h"
#include "tfm_arch.h"
#include "lists.h"
#include "thread.h"
#include "psa/service.h"
#include "load/partition_defs.h"
#include "load/interrupt_defs.h"
#define TFM_HANDLE_STATUS_IDLE 0 /* Handle created */
#define TFM_HANDLE_STATUS_ACTIVE 1 /* Handle in use */
#define TFM_HANDLE_STATUS_TO_FREE 2 /* Free the handle */
/* Privileged definitions for partition thread mode */
#define TFM_PARTITION_UNPRIVILEGED_MODE (0U)
#define TFM_PARTITION_PRIVILEGED_MODE (1U)
#if TFM_LVL == 1
#define GET_PARTITION_PRIVILEGED_MODE(p_ldinf) TFM_PARTITION_PRIVILEGED_MODE
#else
#define GET_PARTITION_PRIVILEGED_MODE(p_ldinf) \
(IS_PARTITION_PSA_ROT(p_ldinf) ? TFM_PARTITION_PRIVILEGED_MODE : \
TFM_PARTITION_UNPRIVILEGED_MODE)
#endif
/*
* Set a number limit for stateless handle.
* Valid handle must be positive, set client handle minimum value to 1.
*/
#define STATIC_HANDLE_NUM_LIMIT 32
#define CLIENT_HANDLE_VALUE_MIN 1
#define STATIC_HANDLE_IDX_BIT_WIDTH 8
#define STATIC_HANDLE_IDX_MASK \
(uint32_t)((1UL << STATIC_HANDLE_IDX_BIT_WIDTH) - 1)
#define GET_INDEX_FROM_STATIC_HANDLE(handle) \
(uint32_t)((handle) & STATIC_HANDLE_IDX_MASK)
#define STATIC_HANDLE_VER_BIT_WIDTH 8
#define STATIC_HANDLE_VER_OFFSET 8
#define STATIC_HANDLE_VER_MASK \
(uint32_t)((1UL << STATIC_HANDLE_VER_BIT_WIDTH) - 1)
#define GET_VERSION_FROM_STATIC_HANDLE(handle) \
(uint32_t)(((handle) >> STATIC_HANDLE_VER_OFFSET) & STATIC_HANDLE_VER_MASK)
/* Validate the static handle indicator bit */
#define STATIC_HANDLE_INDICATOR_OFFSET 30
#define IS_STATIC_HANDLE(handle) \
((handle) & (1UL << STATIC_HANDLE_INDICATOR_OFFSET))
/* Valid index should be [0, STATIC_HANDLE_NUM_LIMIT-1] */
#define IS_VALID_STATIC_HANDLE_IDX(index) \
((uint32_t)(index) < STATIC_HANDLE_NUM_LIMIT)
#define SPM_INVALID_PARTITION_IDX (~0U)
#define TFM_MSG_MAGIC_SFN 0x21216565
/* Get partition by thread or context data */
#define GET_THRD_OWNER(x) TO_CONTAINER(x, struct partition_t, thrd)
#define GET_CTX_OWNER(x) TO_CONTAINER(x, struct partition_t, ctx_ctrl)
/* RoT connection handle list */
struct conn_handle_t {
void *rhandle; /* Reverse handle value */
uint32_t status; /*
* Status of handle, three valid
* options:
* TFM_HANDLE_STATUS_ACTIVE,
* TFM_HANDLE_STATUS_IDLE and
* TFM_HANDLE_STATUS_TO_FREE
*/
struct partition_t *p_client; /* Caller partition */
struct service_t *service; /* RoT service pointer */
union {
struct sync_obj_t ack_evnt; /* IPC - Ack response event */
uint32_t sfn_magic; /* SFN - Indicate a SFN message */
};
psa_msg_t msg; /* PSA message body */
psa_invec invec[PSA_MAX_IOVEC]; /* Put in/out vectors in msg body */
psa_outvec outvec[PSA_MAX_IOVEC];
psa_outvec *caller_outvec; /*
* Save caller outvec pointer for
* write length update
*/
#ifdef TFM_PARTITION_NS_AGENT_MAILBOX
const void *caller_data; /*
* Pointer to the private data of the
* caller. It identifies the NSPE PSA
* client calls in multi-core topology
*/
#endif
#if PSA_FRAMEWORK_HAS_MM_IOVEC
uint32_t iovec_status; /* MM-IOVEC status */
#endif
struct conn_handle_t *p_handles; /* Handle(s) link */
};
/* Partition runtime type */
struct partition_t {
const struct partition_load_info_t *p_ldinf;
void *p_interrupts;
void *p_metadata;
uintptr_t boundary;
uint32_t signals_allowed;
uint32_t signals_waiting;
volatile uint32_t signals_asserted;
#if CONFIG_TFM_SPM_BACKEND_IPC == 1
struct context_ctrl_t ctx_ctrl;
struct sync_obj_t waitobj;
struct thread_t thrd; /* IPC model */
#else
uint32_t state; /* SFN model */
#endif
struct conn_handle_t *p_handles;
struct partition_t *next;
};
/* RoT Service data */
struct service_t {
const struct service_load_info_t *p_ldinf; /* Service load info */
struct partition_t *partition; /* Owner of the service */
struct service_t *next; /* For list operation */
};
/**
* \brief Get the running partition ID.
*
* \return Returns the partition ID
*/
int32_t tfm_spm_partition_get_running_partition_id(void);
/******************** Service handle management functions ********************/
/**
* \brief Create connection handle for client connect
*
* \retval NULL Create failed
* \retval "Not NULL" Service handle created
*/
struct conn_handle_t *tfm_spm_create_conn_handle(void);
/**
* \brief Validate connection handle for client connect
*
* \param[in] conn_handle Handle to be validated
*
* \retval PSA_SUCCESS Success
* \retval SPM_ERROR_GENERIC Invalid handle
*/
psa_status_t tfm_spm_validate_conn_handle(const struct conn_handle_t *conn_handle);
/**
* \brief Free connection handle which not used anymore.
*
* \param[in] conn_handle Connection handle created by
* tfm_spm_create_conn_handle()
*
* \retval "Does not return" Panic for not find service by handle
*/
void tfm_spm_free_conn_handle(struct conn_handle_t *conn_handle);
/******************** Partition management functions *************************/
#if CONFIG_TFM_SPM_BACKEND_IPC == 1
/*
* Lookup and grab the last spotted handles containing the message
* by the given signal. Only ONE signal bit can be accepted in 'signal',
* multiple bits lead to 'no matched handles found to that signal'.
*
* Returns NULL if no handles matched with the given signal.
* Returns an internal handle instance if spotted, the instance
* is moved out of partition handles. Partition available signals
* also get updated based on the count of handles with given signal
* still in the partition handles.
*/
struct conn_handle_t *spm_get_handle_by_signal(struct partition_t *p_ptn,
psa_signal_t signal);
#endif /* CONFIG_TFM_SPM_BACKEND_IPC */
#if CONFIG_TFM_DOORBELL_API == 1
/**
* \brief Get partition by Partition ID.
*
* \param[in] partition_id The Partition ID of the partition to get
*
* \retval NULL Failed
* \retval "Not NULL" Return the parttion context pointer
* \ref partition_t structures
*/
struct partition_t *tfm_spm_get_partition_by_id(int32_t partition_id);
#endif /* CONFIG_TFM_DOORBELL_API == 1 */
/**
* \brief Get the service context by service ID.
*
* \param[in] sid RoT Service identity
*
* \retval NULL Failed
* \retval "Not NULL" Target service context pointer,
* \ref service_t structures
*/
struct service_t *tfm_spm_get_service_by_sid(uint32_t sid);
/************************ Message functions **********************************/
#if CONFIG_TFM_CONNECTION_BASED_SERVICE_API == 1
/**
* \brief Convert the given client handle to SPM recognised
* handle and verify it.
*
* \param[in] handle A handle to an established connection that is
* returned by a prior psa_connect call.
*
* \return A SPM recognised handle or NULL. It is NULL when
* verification of the converted SPM handle fails.
* \ref conn_handle_t structures
*/
struct conn_handle_t *spm_get_handle_by_client_handle(psa_handle_t handle,
int32_t client_id);
#endif
/**
* \brief Convert the given message handle to SPM recognised
* handle and verify it.
*
* \param[in] msg_handle Message handle which is a reference generated
* by the SPM to a specific message.
*
* \return A SPM recognised handle or NULL. It is NULL when
* verification of the converted SPM handle fails.
* \ref conn_handle_t structures
*/
struct conn_handle_t *spm_get_handle_by_msg_handle(psa_handle_t msg_handle);
/**
* \brief Fill the user message in handle.
*
* \param[in] conn_handle The 'conn_handle' contains the user message.
* \param[in] service Target service context pointer, which can be
* obtained by partition management functions
* \prarm[in] handle Connect handle return by psa_connect().
* \param[in] type Message type, PSA_IPC_CONNECT, PSA_IPC_CALL or
* PSA_IPC_DISCONNECT
* \param[in] client_id Partition ID of the sender of the message
* \param[in] invec Array of input \ref psa_invec structures
* \param[in] in_len Number of input \ref psa_invec structures
* \param[in] outvec Array of output \ref psa_outvec structures
* \param[in] out_len Number of output \ref psa_outvec structures
* \param[in] caller_outvec Array of caller output \ref psa_outvec structures
*/
void spm_fill_message(struct conn_handle_t *conn_handle,
struct service_t *service,
psa_handle_t handle,
int32_t type, int32_t client_id,
psa_invec *invec, size_t in_len,
psa_outvec *outvec, size_t out_len,
psa_outvec *caller_outvec);
/**
* \brief Check the client version according to
* version policy
*
* \param[in] service Target service context pointer, which can be get
* by partition management functions
* \param[in] version Client support version
*
* \retval PSA_SUCCESS Success
* \retval SPM_ERROR_BAD_PARAMETERS Bad parameters input
* \retval SPM_ERROR_VERSION Check failed
*/
int32_t tfm_spm_check_client_version(struct service_t *service,
uint32_t version);
/**
* \brief Check the client access authorization
*
* \param[in] sid Target RoT Service identity
* \param[in] service Target service context pointer, which can be get
* by partition management functions
* \param[in] ns_caller Whether from NS caller
*
* \retval PSA_SUCCESS Success
* \retval SPM_ERROR_GENERIC Authorization check failed
*/
int32_t tfm_spm_check_authorization(uint32_t sid,
struct service_t *service,
bool ns_caller);
/**
* \brief Get the ns_caller info from runtime context.
*
* \retval - true: the PSA API caller is from non-secure
* - false: the PSA API caller is from secure
*/
bool tfm_spm_is_ns_caller(void);
/**
* \brief Get ID of current RoT Service client.
* This API ensures the caller gets a valid ID.
*
* \param[in] ns_caller If the client is Non-Secure or not.
*
* \retval The client ID
*/
int32_t tfm_spm_get_client_id(bool ns_caller);
/*
* PendSV specified function.
*
* Parameters :
* p_actx - Architecture context storage pointer
*
* Return:
* Pointers to context control (sp, splimit, dummy, lr) of the current and
* the next thread.
* Each takes 32 bits. The context control is used by PendSV_Handler to do
* context switch.
*/
uint64_t ipc_schedule(void);
/**
* \brief SPM initialization implementation
*
* \details This function must be called under handler mode.
* \retval This function returns an EXC_RETURN value. Other
* faults would panic the execution and never
* returned.
*/
uint32_t tfm_spm_init(void);
/**
* \brief Converts a handle instance into a corresponded user handle.
*/
psa_handle_t tfm_spm_to_user_handle(struct conn_handle_t *handle_instance);
/**
* \brief Converts a user handle into a corresponded handle instance.
*/
struct conn_handle_t *tfm_spm_to_handle_instance(psa_handle_t user_handle);
/**
* \brief Move to handler mode by a SVC for specific purpose
*/
void tfm_core_handler_mode(void);
void update_caller_outvec_len(struct conn_handle_t *handle);
/*
* Set partition signal.
*
* Assert a signal to given partition.
*/
void spm_assert_signal(void *p_pt, psa_signal_t signal);
#if CONFIG_TFM_PSA_API_CROSS_CALL == 1
/*
* SPM dispatcher to handle the API call under non-privileged model.
* This API runs under callers stack, and switch to SPM stack when
* calling 'p_fn', then switch back to caller stack before returning
* to the caller.
*
* fn_addr - the target function to be called.
* frame_addr - Address of the customized ABI frame. The frame must be
* stored in the caller's stack (which means the frame variable
* must be a local variable).
*/
void spm_interface_cross_dispatcher(uintptr_t fn_addr, uintptr_t frame_addr);
/* Execute a customized ABI function in C */
psa_status_t cross_call_entering_c(uintptr_t fn_addr, uintptr_t frame_addr);
/* Execute a customized ABI function in C */
void cross_call_exiting_c(psa_status_t status, uintptr_t frame_addr);
#endif
#endif /* __SPM_IPC_H__ */